CVE-2026-3289: Path Traversal in Sanluan PublicCMS
CVE-2026-3289 is a medium severity path traversal vulnerability affecting Sanluan PublicCMS version 6. 202506. d. The flaw exists in the saveMetadata function within TemplateCacheComponent. java, allowing remote attackers to manipulate file paths. Exploitation does not require user interaction but does require low-level privileges. The vulnerability could enable attackers to access or overwrite arbitrary files on the server, potentially leading to information disclosure or integrity compromise. Although the vendor was notified, no patch or response has been issued, and a public exploit is available. No known active exploitation in the wild has been reported yet. Organizations using this specific CMS version should prioritize mitigation to prevent potential attacks.
AI Analysis
Technical Summary
CVE-2026-3289 identifies a path traversal vulnerability in Sanluan PublicCMS version 6.202506.d, specifically within the saveMetadata function of the TemplateCacheComponent.java file, which is part of the Template Cache Generation component. Path traversal vulnerabilities allow attackers to manipulate file paths to access files and directories outside the intended scope, potentially leading to unauthorized file read or write operations. This vulnerability can be exploited remotely without user interaction, but it requires low privileges on the system (PR:L). The CVSS 4.0 score of 5.3 reflects a medium severity, considering the attack vector is network-based (AV:N), with low attack complexity (AC:L), no user interaction (UI:N), and no privileges required for attack initiation (AT:N) but low privileges needed (PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited degree (VC:L, VI:L, VA:L). The vendor was contacted early but did not respond or provide a patch, and a public exploit is available, increasing the risk of exploitation. The vulnerability could allow attackers to read or write arbitrary files on the server hosting PublicCMS, potentially exposing sensitive data or enabling further compromise. No known active exploitation in the wild has been reported to date. The lack of vendor response and public exploit availability necessitates immediate attention from organizations using this CMS version. The affected component, Template Cache Generation, is critical for CMS operation, making exploitation impactful on web content integrity and availability.
Potential Impact
The potential impact of CVE-2026-3289 includes unauthorized access to sensitive files and data leakage, which compromises confidentiality. Attackers could also modify or overwrite files, affecting the integrity of the CMS and potentially leading to website defacement or injection of malicious code. Availability could be impacted if critical files are deleted or corrupted, disrupting web services. Since exploitation requires only low privileges and no user interaction, attackers with limited access could escalate their control or pivot to other systems. Organizations relying on Sanluan PublicCMS 6.202506.d for web content management are at risk of data breaches, reputational damage, and operational disruption. The absence of a vendor patch and the presence of a public exploit increase the likelihood of exploitation attempts, especially by opportunistic attackers. This vulnerability could be leveraged as an initial foothold in targeted attacks or as part of broader campaigns against web infrastructure.
Mitigation Recommendations
Organizations should immediately audit their use of Sanluan PublicCMS to identify installations running version 6.202506.d. Until a vendor patch is available, implement strict access controls to limit who can interact with the CMS, especially restricting low-privilege accounts from accessing the Template Cache Generation functionality. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the saveMetadata function. Monitor logs for unusual file access patterns or attempts to manipulate file paths. Consider isolating the CMS environment to minimize lateral movement if compromised. Regularly back up CMS data and configuration files to enable recovery from potential file corruption or deletion. Engage with the vendor or community for updates or unofficial patches. If feasible, upgrade to a later, unaffected version once available. Conduct penetration testing focused on path traversal vulnerabilities to identify other potential weaknesses. Educate administrators about the risks and signs of exploitation related to this vulnerability.
Affected Countries
China, United States, Germany, India, Brazil, Russia, South Korea, Japan, United Kingdom, France
CVE-2026-3289: Path Traversal in Sanluan PublicCMS
Description
CVE-2026-3289 is a medium severity path traversal vulnerability affecting Sanluan PublicCMS version 6. 202506. d. The flaw exists in the saveMetadata function within TemplateCacheComponent. java, allowing remote attackers to manipulate file paths. Exploitation does not require user interaction but does require low-level privileges. The vulnerability could enable attackers to access or overwrite arbitrary files on the server, potentially leading to information disclosure or integrity compromise. Although the vendor was notified, no patch or response has been issued, and a public exploit is available. No known active exploitation in the wild has been reported yet. Organizations using this specific CMS version should prioritize mitigation to prevent potential attacks.
AI-Powered Analysis
Technical Analysis
CVE-2026-3289 identifies a path traversal vulnerability in Sanluan PublicCMS version 6.202506.d, specifically within the saveMetadata function of the TemplateCacheComponent.java file, which is part of the Template Cache Generation component. Path traversal vulnerabilities allow attackers to manipulate file paths to access files and directories outside the intended scope, potentially leading to unauthorized file read or write operations. This vulnerability can be exploited remotely without user interaction, but it requires low privileges on the system (PR:L). The CVSS 4.0 score of 5.3 reflects a medium severity, considering the attack vector is network-based (AV:N), with low attack complexity (AC:L), no user interaction (UI:N), and no privileges required for attack initiation (AT:N) but low privileges needed (PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited degree (VC:L, VI:L, VA:L). The vendor was contacted early but did not respond or provide a patch, and a public exploit is available, increasing the risk of exploitation. The vulnerability could allow attackers to read or write arbitrary files on the server hosting PublicCMS, potentially exposing sensitive data or enabling further compromise. No known active exploitation in the wild has been reported to date. The lack of vendor response and public exploit availability necessitates immediate attention from organizations using this CMS version. The affected component, Template Cache Generation, is critical for CMS operation, making exploitation impactful on web content integrity and availability.
Potential Impact
The potential impact of CVE-2026-3289 includes unauthorized access to sensitive files and data leakage, which compromises confidentiality. Attackers could also modify or overwrite files, affecting the integrity of the CMS and potentially leading to website defacement or injection of malicious code. Availability could be impacted if critical files are deleted or corrupted, disrupting web services. Since exploitation requires only low privileges and no user interaction, attackers with limited access could escalate their control or pivot to other systems. Organizations relying on Sanluan PublicCMS 6.202506.d for web content management are at risk of data breaches, reputational damage, and operational disruption. The absence of a vendor patch and the presence of a public exploit increase the likelihood of exploitation attempts, especially by opportunistic attackers. This vulnerability could be leveraged as an initial foothold in targeted attacks or as part of broader campaigns against web infrastructure.
Mitigation Recommendations
Organizations should immediately audit their use of Sanluan PublicCMS to identify installations running version 6.202506.d. Until a vendor patch is available, implement strict access controls to limit who can interact with the CMS, especially restricting low-privilege accounts from accessing the Template Cache Generation functionality. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the saveMetadata function. Monitor logs for unusual file access patterns or attempts to manipulate file paths. Consider isolating the CMS environment to minimize lateral movement if compromised. Regularly back up CMS data and configuration files to enable recovery from potential file corruption or deletion. Engage with the vendor or community for updates or unofficial patches. If feasible, upgrade to a later, unaffected version once available. Conduct penetration testing focused on path traversal vulnerabilities to identify other potential weaknesses. Educate administrators about the risks and signs of exploitation related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-26T16:56:55.155Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a1ec5132ffcdb8a267e1f3
Added to database: 2/27/2026, 7:11:13 PM
Last enriched: 2/27/2026, 7:27:22 PM
Last updated: 2/27/2026, 8:25:41 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27947: CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Intermesh groupoffice
CriticalCVE-2026-27836: CWE-862: Missing Authorization in thorsten phpMyFAQ
HighCVE-2025-69437: n/a
HighCVE-2026-27832: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Intermesh groupoffice
HighCVE-2026-27824: CWE-307: Improper Restriction of Excessive Authentication Attempts in kovidgoyal calibre
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.